Listing 1 - 10 of 19 | << page >> |
Sort by
|
Choose an application
This monograph provides a practical definition of terrorism risk, presents a method of estimating it, and demonstrates a framework for evaluating this method. Results support conclusions on how to improve risk-based resource allocation.
Federal aid to terrorism prevention -- United States -- Planning. --- Terrorism -- Prevention. --- Terrorism -- United States -- Prevention. --- Terrorism risk assessment -- United States. --- Terrorism --- Federal aid to terrorism prevention --- Prevention. --- Risk assessment --- Planning. --- Acts of terrorism --- Attacks, Terrorist --- Global terrorism --- International terrorism --- Political terrorism --- Terror attacks --- Terrorist acts --- Terrorist attacks --- World terrorism --- Prevention --- Federal aid --- Direct action --- Insurgency --- Political crimes and offenses --- Subversive activities --- Political violence --- Terror --- Finance
Choose an application
The pending expiration of the Terrorism Risk Insurance Act (TRIA) of 2002 is the impetus for this assessment of how TRIA redistributes terrorism losses, helping to inform policymakers on whether to extend, modify, or terminate it.
Casualty insurance --- Risk management --- Terrorism --- Law and legislation
Choose an application
Terrorism --- Public-private sector cooperation --- Technology and state --- Prevention
Choose an application
Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic ""insider's look"" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to ""hack along"" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications.Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combina
Terrorism --- Suspense fiction. --- Computer network resources. --- Suspense tales --- Tales, Suspense --- Thrillers (Fiction) --- Acts of terrorism --- Attacks, Terrorist --- Global terrorism --- International terrorism --- Political terrorism --- Terror attacks --- Terrorist acts --- Terrorist attacks --- World terrorism --- Fiction --- Direct action --- Insurgency --- Political crimes and offenses --- Subversive activities --- Political violence --- Terror
Choose an application
Medicine --- Health & Biological Sciences --- Emergency Medicine --- Bioterrorism --- Emergency medical services --- Health aspects --- Planning. --- Emergency health services --- Emergency medical care --- Emergency medicine --- Medical care --- Rescue work --- Bio-terrorism --- Biological terrorism --- Terrorism --- Law and legislation
Choose an application
"The primary goal of the journal is to be the academic publication that furthers the discussion and debate of important elements that comprise the nation's homeland security system. Homeland Security Affairs is meant to encourage relevant research and commentary by academics and practitioners and provide an outlet for the growing body of knowledge that addresses the diversity of homeland security issues and challenges"--Notes from the editor.
Civil defense --- National security --- Terrorism --- Prevention --- United States --- United States. --- Defenses
Choose an application
The terrorist attacks of 9/11 plunged the United States into a determined counteroffensive against Osama bin Laden and his al Qaeda terrorist network. This report details the initial U.S. military response to those attacks, namely, the destruction of al QaedaÂs terrorist infrastructure and the removal of the ruling Taliban regime in Afghanistan. The author emphasizes several distinctive achievements in this war, including the use of precision air-delivered weapons that were effective irrespective of weather, the first combat use of Predator unmanned aerial vehicles armed with Hellfire missiles
Afghan War, 2001 --- -Afghan War, 2001 --- -War on Terrorism, 2001-2009. --- Aerial operations, American. --- Global Struggle Against Violent Extremism, 2001-2009 --- Global War on Terror, 2001-2009 --- GWOT, 2001-2009 (War on Terrorism) --- Terror War, 2001-2009 --- Terrorism War, 2001-2009 --- War against Terrorism, 2001-2009 --- War on Terror, 2001-2009 --- Military history, Modern --- Terrorism --- World politics --- -Iraq War, 2003-2011 --- Operation Enduring Freedom, 2001 --- -Operation Enduring Freedom, 2001 --- -War on Terrorism, 2001-2009 --- Prevention --- Afghan War, 2001-2021 --- Iraq War, 2003-2011 --- War on Terrorism, 2001-2009.
Choose an application
Examines how state and local law enforcement agencies conducted and supported counterterrorism intelligence activities after 9/11.
Intelligence service. --- Law enforcement. --- Terrorism -- Prevention. --- War on Terrorism, 2001-2009. --- War on Terrorism, 2001-2009 --- Law enforcement --- Intelligence service --- Terrorism --- Criminology, Penology & Juvenile Delinquency --- Social Welfare & Social Work --- Social Sciences --- Prevention --- Prevention. --- Anti-terrorism --- Antiterrorism --- Counter-terrorism --- Counterterrorism --- Counter intelligence --- Counterespionage --- Counterintelligence --- Intelligence community --- Secret police (Intelligence service) --- Enforcement of law --- Global Struggle Against Violent Extremism, 2001-2009 --- Global War on Terror, 2001-2009 --- GWOT, 2001-2009 (War on Terrorism) --- Terror War, 2001-2009 --- Terrorism War, 2001-2009 --- War against Terrorism, 2001-2009 --- War on Terror, 2001-2009 --- Public administration --- Research --- Disinformation --- Secret service --- Criminal justice, Administration of --- Military history, Modern --- World politics --- Afghan War, 2001 --- -Iraq War, 2003-2011 --- Operation Enduring Freedom, 2001 --- -Prevention. --- Policing --- Afghan War, 2001-2021 --- Iraq War, 2003-2011
Choose an application
Reveals how Russian businesses are using information and communications technology (IT) to enhance profitability, and examines the impact of IT on government operations and the course of the Information Revolution in Russian society.
Deployment (Strategy). --- United States - Armed Forces - Recruiting, enlistment, etc. --- Local Government --- Disease Notification --- Deployment (Strategy) --- Strategy --- United States --- Armed Forces --- Recruiting, enlistment, etc. --- Personnel management. --- Information society --- Information technology --- Economic aspects --- Political aspects --- Social aspects --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Aircraft carriers --- Afghan War, 2001 --- -Afghan War, 2001 --- -War on Terrorism, 2001-2009. --- Iraq War, 2003-2011 --- Anglo-American Invasion of Iraq, 2003-2011 --- Dawn, Operation New, 2010-2011 --- Gulf War II, 2003-2011 --- Iraqi Freedom, Operation, 2003-2010 --- New Dawn, Operation, 2010-2011 --- Operation Iraqi Freedom, 2003-2010 --- Operation New Dawn, 2010-2011 --- Operation Telic, 2003-2011 --- Persian Gulf War, 2003-2011 --- Telic, Operation, 2003-2011 --- War on Terrorism, 2001-2009 --- Global Struggle Against Violent Extremism, 2001-2009 --- Global War on Terror, 2001-2009 --- GWOT, 2001-2009 (War on Terrorism) --- Terror War, 2001-2009 --- Terrorism War, 2001-2009 --- War against Terrorism, 2001-2009 --- War on Terror, 2001-2009 --- Military history, Modern --- Terrorism --- World politics --- -Iraq War, 2003-2011 --- Operation Enduring Freedom, 2001 --- -Operation Enduring Freedom, 2001 --- -War on Terrorism, 2001-2009 --- Airplane carriers --- Carriers, Aircraft --- Carriers (Warships) --- Naval aviation --- Warships --- Aerial operations, American. --- Naval operations, American. --- Prevention --- United States. --- U.S. Marine Corps --- United States Marine Corps --- USMC --- U.S. Navy --- Aviation. --- Afghan War, 2001-2021 --- War on Terrorism, 2001-2009. --- -Airplane carriers --- USMC (United States Marine Corps) --- Technological forecasting. --- National security --- Social aspects. --- Low-intensity conflicts (Military science) --- South Asia --- Military policy. --- Military relations --- Politics and government.
Choose an application
A manual of standardized proficiency tests to help public health agencies develop strategies for testing their disease reporting systems.
Decision support systems. --- Military planning -- United States -- Decision making -- Data processing. --- United States. Air Force -- Research. --- Terrorism --- Terrorism risk assessment --- Federal aid to terrorism prevention --- Criminology, Penology & Juvenile Delinquency --- Social Welfare & Social Work --- Social Sciences --- Prevention --- Planning --- Military planning --- Decision making --- Data processing. --- United States. --- Research. --- War planning --- AF --- Air Force (U.S.) --- U.S.A.F. --- United States Air Force --- US Air Force --- USAF --- Management information systems --- Telematics --- Military administration --- Military policy --- AF (Air force) --- U.S.A.F. (Air force) --- USAF (Air force) --- Diseases --- Public health --- Reporting. --- Information services.
Listing 1 - 10 of 19 | << page >> |
Sort by
|